Analysis

  • max time kernel
    375s
  • max time network
    1588s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-08-2022 11:22

General

  • Target

    http://Samsung.com/tetherwdautomotion

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 49 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://Samsung.com/tetherwdautomotion
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2716

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    471B

    MD5

    db32742b18ca6c7120bc81a7c6f8d71e

    SHA1

    89cc1b9871527e09e176ccc6f4849e33311e936c

    SHA256

    c0d6f583141d82ffdea54806b4fb803b17f902c278f76f7d00a345c4f2997b89

    SHA512

    ba22c4a611025c68722ffd47e13579e974683ddb13900ea88e325b1014104fa29a2507ad89d30ae4913659c664b447147fba1cfa87497be87897fe4b3c5f65eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    Filesize

    404B

    MD5

    7ea17a13eeacbea94485eda15d27fb59

    SHA1

    dc43fda24fbb4e38ad25aed4798fb59114dafd6c

    SHA256

    8ed5eef32496ee50b2e2daca6ff0874b43dba9e79b99da0b4f117fa80bfa80d1

    SHA512

    d5f6eb1a08d2c433a47d3fafd675b76a3903bbec617ad607295d61fc3754ca41d6b5b3cbdd518e5be077dcac59b7eb600ed425482b2d3a16fcc15b2d8e4a0796

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\10JC1AHN.cookie
    Filesize

    610B

    MD5

    c1755d978ca1d02085862ad83f6717c7

    SHA1

    df6b5aa6c4297e9388f350915fc9e1b034ba5119

    SHA256

    f56b75f98646b5f820a9ceefb2c7bf6ed977ddd7a44704af23e4e33d6f36d0f5

    SHA512

    75ac5fcbb430c8f5ed6929cbed4b57f5fd699b6d77d011325bc03c206c398ac7f39d39f2782e856e01c77edfb5dfed01b6d1ed2af877faba8fa10993f285aeb5